CAPEC-478

Modification of Windows Service Configuration
LOW
HIGH
Usable
2018-04-25 00:00 +00:00
2021-10-21 00:00 +00:00

Alerte pour un CAPEC

Stay informed of any changes for a specific CAPEC.
Alert management

Description

An adversary exploits a weakness in access control to modify the execution parameters of a Windows service. The goal of this attack is to execute a malicious binary in place of an existing service.

Informations

Execution Flow

1) Explore

[Determine target system] The adversary must first determine the system they wish to modify the registry of. This needs to be a windows machine as this attack only works on the windows registry.

2) Experiment

[Gain access to the system] The adversary needs to gain access to the system in some way so that they can modify the windows registry.

Technique
  • Gain physical access to a system either through shoulder surfing a password or accessing a system that is left unlocked.
  • Gain remote access to a system through a variety of means.

3) Exploit

[Modify windows registry] The adversary will modify the windows registry by changing the configuration settings for a service. Specifically, the adversary will change the path settings to define a path to a malicious binary to be executed.

Prerequisites

The adversary must have the capability to write to the Windows Registry on the targeted system.

Resources Required

None: No specialized resources are required to execute this type of attack.

Mitigations

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.

Related Weaknesses

CWE-ID Weakness Name
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Submission

Name Organization Date Date Release
CAPEC Content Team The MITRE Corporation 2018-04-25 +00:00

Modifications

Name Organization Date Comment
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated Taxonomy_Mappings
CAPEC Content Team The MITRE Corporation 2021-10-21 +00:00 Updated Description, Execution_Flow
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.